Home

Description

Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.

PUBLISHED Reserved 2025-12-11 | Published 2026-02-10 | Updated 2026-02-23 | Assigner microsoft




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-20: Improper Input Validation

CWE-122: Heap-based Buffer Overflow

CWE-125: Out-of-bounds Read

Product status

10.0.14393.0 (custom) before 10.0.14393.8868
affected

10.0.17763.0 (custom) before 10.0.17763.8389
affected

10.0.19044.0 (custom) before 10.0.19044.6937
affected

10.0.19045.0 (custom) before 10.0.19045.6937
affected

10.0.22631.0 (custom) before 10.0.22631.6649
affected

10.0.22631.0 (custom) before 10.0.22631.6649
affected

10.0.26100.0 (custom) before 10.0.26100.7840
affected

10.0.26200.0 (custom) before 10.0.26200.7840
affected

10.0.28000.0 (custom) before 10.0.28000.1575
affected

10.0.28000.0 (custom) before 10.0.28000.1575
affected

10.0.14393.0 (custom) before 10.0.14393.8868
affected

10.0.14393.0 (custom) before 10.0.14393.8868
affected

10.0.17763.0 (custom) before 10.0.17763.8389
affected

10.0.17763.0 (custom) before 10.0.17763.8389
affected

10.0.20348.0 (custom) before 10.0.20348.4773
affected

10.0.25398.0 (custom) before 10.0.25398.2149
affected

10.0.26100.0 (custom) before 10.0.26100.32370
affected

10.0.26100.0 (custom) before 10.0.26100.32370
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21247 (Windows Hyper-V Remote Code Execution Vulnerability) vendor-advisory patch

cve.org (CVE-2026-21247)

nvd.nist.gov (CVE-2026-21247)

Download JSON